Information Gathering Using Backtrack

Rating :

Comments

Donnyat December 12,2014Eli the computer guy is a great resource for anyone looking for simple but detailed explorations into all things cyber. This video on Metasploit is no exception - highly recommended.

dmoravalat February 12,2015This is a very interesting video. By the way, I watched a lot of interesting videos from “Eli de computer guy” and all of them are very nice. The idea to have a Framework to produce exploits is worth, because we can produce many types of tools, complex specific tasks to analyze a network. Well, I am Software Engineer and I know the difference between a Framework and a software solution or tool. I encourage you to see the video. You will get a general idea about Metasploit.

nbodykat February 22,2015An interesting information video on metasploit. Interesting framework tool to allow you to check the vulnerability of your systems and network. $5000 dollars is a ridiculous price to pay for a tool, I see why people elect to go for the free ones. Unless you're working for a company that can afford it, you'll be using the free version. Some organizations won't be on board for an annual $5000 bill. Eli the Computer guy is a pretty good teacher, his analogy to lego blocks makes it easy to understand. Then he explained the terms you need to know and was key to point out that metasploit is a framework that allows you to create tools to target specific functions.

connellytat February 28,2015This is a good introductory video that explains what Metasploit is, but you will have to watch the rest of the series to see how to actually use it. This video just explains the terminology, and gives a foundational understanding of the Metasploit framework.

jczarnyat March 08,2015I've always liked Eli the Computer Guy. He always does a great job at explaining even very complicated subjects. In this case, this was just a real simple primer on metasploit that also covers some other simple exploit terms. I learned a little, but not a lot. I found an article about the FBI using parts of the metasploit framework to crack TOR which is also interesting. http://www.wired.com/2014/12/fbi-metasploit-tor/